ID

VAR-202201-2050


CVE

CVE-2021-40327


TITLE

Trusted Firmware-M  Vulnerability regarding lack of authentication in

Trust: 0.8

sources: JVNDB: JVNDB-2022-003656

DESCRIPTION

Trusted Firmware-M (TF-M) 1.4.0, when Profile Small is used, has incorrect access control. NSPE can access a secure key (held by the Crypto service) based solely on knowledge of its key ID. For example, there is no authorization check associated with the relationship between a caller and a key owner. Trusted Firmware-M (TF-M) Exists in a vulnerability related to the lack of authentication.Information may be obtained. Linaro Trusted Firmware-M (Tf-M) is a reference implementation of Linaro's Platform Security Architecture (Psa) IoT security framework

Trust: 2.25

sources: NVD: CVE-2021-40327 // JVNDB: JVNDB-2022-003656 // CNNVD: CNNVD-202201-1029 // VULHUB: VHN-401694

AFFECTED PRODUCTS

vendor:trustedfirmwaremodel:trusted -mscope:eqversion:1.4.0

Trust: 1.0

vendor:linaromodel:trusted -mscope:eqversion: -

Trust: 0.8

vendor:linaromodel:trusted -mscope:eqversion:1.4.0

Trust: 0.8

sources: JVNDB: JVNDB-2022-003656 // NVD: CVE-2021-40327

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2021-40327
value: MEDIUM

Trust: 1.0

NVD: CVE-2021-40327
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-202201-1029
value: MEDIUM

Trust: 0.6

VULHUB: VHN-401694
value: LOW

Trust: 0.1

nvd@nist.gov: CVE-2021-40327
severity: LOW
baseScore: 2.6
vectorString: AV:N/AC:H/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: HIGH
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 4.9
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-401694
severity: LOW
baseScore: 2.6
vectorString: AV:N/AC:H/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: HIGH
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 4.9
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2021-40327
baseSeverity: MEDIUM
baseScore: 5.9
vectorString: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
attackVector: NETWORK
attackComplexity: HIGH
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 2.2
impactScore: 3.6
version: 3.1

Trust: 1.0

NVD: CVE-2021-40327
baseSeverity: MEDIUM
baseScore: 5.9
vectorString: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
attackVector: NETWORK
attackComplexity: HIGH
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: VULHUB: VHN-401694 // JVNDB: JVNDB-2022-003656 // CNNVD: CNNVD-202201-1029 // NVD: CVE-2021-40327

PROBLEMTYPE DATA

problemtype:CWE-862

Trust: 1.1

problemtype:Lack of authentication (CWE-862) [NVD evaluation ]

Trust: 0.8

sources: VULHUB: VHN-401694 // JVNDB: JVNDB-2022-003656 // NVD: CVE-2021-40327

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202201-1029

TYPE

other

Trust: 0.6

sources: CNNVD: CNNVD-202201-1029

PATCH

title:indexurl:https://git.trustedfirmware.org/TF-M/trusted-firmware-m.git/

Trust: 0.8

title:Linaro Trusted Firmware-M Security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=177897

Trust: 0.6

sources: JVNDB: JVNDB-2022-003656 // CNNVD: CNNVD-202201-1029

EXTERNAL IDS

db:NVDid:CVE-2021-40327

Trust: 3.3

db:JVNDBid:JVNDB-2022-003656

Trust: 0.8

db:CNNVDid:CNNVD-202201-1029

Trust: 0.6

db:VULHUBid:VHN-401694

Trust: 0.1

sources: VULHUB: VHN-401694 // JVNDB: JVNDB-2022-003656 // CNNVD: CNNVD-202201-1029 // NVD: CVE-2021-40327

REFERENCES

url:https://tf-m-user-guide.trustedfirmware.org/docs/security/security_advisories/profile_small_key_id_encoding_vulnerability.html

Trust: 1.7

url:https://developer.arm.com/support/arm-security-updates

Trust: 1.7

url:https://git.trustedfirmware.org/tf-m/trusted-firmware-m.git/

Trust: 1.7

url:https://nvd.nist.gov/vuln/detail/cve-2021-40327

Trust: 1.4

sources: VULHUB: VHN-401694 // JVNDB: JVNDB-2022-003656 // CNNVD: CNNVD-202201-1029 // NVD: CVE-2021-40327

SOURCES

db:VULHUBid:VHN-401694
db:JVNDBid:JVNDB-2022-003656
db:CNNVDid:CNNVD-202201-1029
db:NVDid:CVE-2021-40327

LAST UPDATE DATE

2024-11-23T22:10:54.933000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-401694date:2022-01-25T00:00:00
db:JVNDBid:JVNDB-2022-003656date:2023-03-02T08:26:00
db:CNNVDid:CNNVD-202201-1029date:2022-01-26T00:00:00
db:NVDid:CVE-2021-40327date:2024-11-21T06:23:52.240

SOURCES RELEASE DATE

db:VULHUBid:VHN-401694date:2022-01-13T00:00:00
db:JVNDBid:JVNDB-2022-003656date:2023-03-02T00:00:00
db:CNNVDid:CNNVD-202201-1029date:2022-01-13T00:00:00
db:NVDid:CVE-2021-40327date:2022-01-13T16:15:07.993